-
CVE-2025-38586
- EPSS 0.03%
- Veröffentlicht 19.08.2025 17:15:36
- Zuletzt bearbeitet 20.08.2025 14:40:17
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: bpf, arm64: Fix fp initialization for exception boundary In the ARM64 BPF JIT when prog->aux->exception_boundary is set for a BPF program, find_used_callee_regs() is not called because for a program acting as exception boundary, all callee saved registers are saved. find_used_callee_regs() sets `ctx->fp_used = true;` when it sees FP being used in any of the instructions. For programs acting as exception boundary, ctx->fp_used remains false even if frame pointer is used by the program and therefore, FP is not set-up for such programs in the prologue. This can cause the kernel to crash due to a pagefault. Fix it by setting ctx->fp_used = true for exception boundary programs as fp is always saved in such programs.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
0dbef493cae7d451f740558665893c000adb2321
Version
5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff
Status
affected
Version <
e23184725dbb72d5d02940222eee36dbba2aa422
Version
5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff
Status
affected
Version <
1ce30231e0a2c8c361ee5f8f7f265fc17130adce
Version
5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff
Status
affected
Version <
b114fcee766d5101eada1aca7bb5fd0a86c89b35
Version
5d4fa9ec5643a5c75d3c1e6abf50fb9284caf1ff
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.12
Status
affected
Version <
6.12
Version
0
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.055 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|